Security & Ethics Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Hacking

A

Illegally gaining access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cracking

A

Illegally changing source code of a program so that it can be exploited for another
use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware

A

User clicks on a link from an email or website
When clicked spyware is downloaded
Monitors users activity and relays it back to author
Keypresses can be analysed to find passwords
Common key logs allow password to be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Viruses

A

Program that replicates itself
Deletes or corrupts files
Ransomware a new form of virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

Fake email sent that locks legitimate
User clicks on link in the email
User redirected to fake website
Often used to try and steal financial details
How to avoid – Don’t click on links from unknown emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pharming

A

Malicious code stored on a computer
Redirects user to fake website to steal users data
How to avoid – check the URL is as expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cookies

A

Message given to browser by webserver
Stored in a text file
Stores detail about users preferences on a website
Message sent back to server each time that page is requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses of Cookies

A

Enable logon information to be kept
Provide customized pages for the user
Enable target adverts
Enable one-click purchasing with shopping carts
Be able to distinguish between new and repeat visitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cause of Data Loss

A
Accidental Deletion
Malicious – virus
Hardware failure
Software failure
Natural disaster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prevention of Data loss

A

Set data to read only
Use correct shut down procedures
Use correct procedures wen removing portable storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewalls

A
Prevents unauthorized access
Acts as a filter for incoming/outgoing data
Checks data meets criteria
Logs incoming and outgoing traffic
Blocks access to specified IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus

A

Compares virus signature against a database of known virus signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy Server

A
Keeps user IP address secret
Prevents direct access to a webserver
Filters traffic
Speeds up traffic using CACHE
Blocks selected IP addresses
Helps prevent hacking of a webserver
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keeping Data Safe

A
Encrypt the data
Password protection
Virus checking software
Physical methods
Access rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On Screen Security Methods

A

On screen keypad
Uses on-screen keypad
No keypresses so keylogging software won’t work
Numbers on key pad can be made random

Drop down boxes
Protects against key logging software
Stops key presses being recorded and relayed
Boxes can be placed in different locations each time to prevent screen capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Text

A

Characters typed at a keyboard and can be changed by the user

17
Q

Biometric

A
Scanned physical measurement that is compared to stored previously scanned measurement:
Finger print
Retina scan
Voice recognition
Face recognition
18
Q

Security Protocols

A
Uses encryption
Uses SSL
Uses digital certificates – contains public key
Makes use of public and private keys
Data is meaningless without the key
19
Q

How can we tell a website is using SSL

A

Protocol end in s e.g. https
Padlock on some browsers
Colour of address bar changes

20
Q

SSL Process

A

Uses digital certificates
the browser asks the web server to identify itself
Server sends SSL
client and server agree on an encryption method to use that contains the server’s public key
Browser check authenticity of the certificate
A session key is generated
Sends signal to begin transmission

21
Q

TLS

A

Record layer
Contains the data being transferred
Can be used with or without encryption

Handshake layer
Website and client authenticate each other
Encryption algorithms used to establish secure session

22
Q

Differences between TLS and SSL

A

Possible to extend TLS using new authentication methods
TLS can make use of session caching
TLS separates handshake and record protocol

23
Q

Encryption

A
Before encryption it is plain text
Text encrypted using an algorithm
Text encrypted using a key
Encrypted text called cypher text
Key transmitted separately from text
Key used to decrypt the cypher text
24
Q

Asymmetric Encryption

A

Private key and Public key needed
Public key given to everyone
Private key only known by the computer user
Encryption keys generated using a hashing algorithm

25
Q

Authentication

A

Used to verify that data comes from trusted source

26
Q

Symmetric Encryption

A

Uses the same key to encrypt and decrypt data

1 key needed to encrypt and another to decrypt

27
Q

Hashing algorithm

A

Takes message or key and translates it into string of characters
Usually shown in hex notation
Length depends on algorithm used
Same hashing algorithm needed to decrypt

28
Q

DoS Attacks

A

Large number of requests sent to server at once
Designed to flood a server with useless traffic
Server will come to a stop trying to deal with the traffic
Prevents users gaining access to the web server

29
Q

Misuses

A

Hacking

Malware

30
Q

Intellectual Property Rights

A

Copyright laws

31
Q

Privacy and Anonymity Issues

A

social media

32
Q

Effects of Computers on Society

A

Loss of jobs

Addiction and health problems

33
Q

Laws

A

Data protection act

Computer misuse act

34
Q

Environmental impacts

A

E-waste

35
Q

Free Software

A

Can use for any legal purpose you wish
Can study and change the source code
Can pass on to other people
Must not be used to infringe copyright laws by copying existing software

36
Q

Freeware

A

Can download and use free of charge

Cannot view or modify the source code e.g. Skype

37
Q

Shareware

A
Can use for a trial free of charge
Need to pay once the trial is over
Often trial version missing key features
Protected fully by copyright laws
Cannot modify code or distribute the software
38
Q

How cookies work

A

Cookie file is stored by browser on user’s SSD/HDD
User’s details are stored in encrypted text file
Webserver requests cooke file
Browser sends cooke file to webserver

39
Q

Dangers of cookies

A

User does not see what information is stored
Users feel their privacy is affected
Sensitive information on cookies could be intercepted in transmission
Other websites could gain access to the cookies
Computer can be hacked and cookie may be obtained.